Secure and Fast Chaos based Encryption System using Digital Logic Circuit

Full Text (PDF, 573KB), PP.25-33

Views: 0 Downloads: 0


Ankur A. Khare 1,* Piyush Kumar Shukla 1 Sanjay C. Silakari 1

1. Computer Science & Engineering, University of Information Technology, Bhopal, India

* Corresponding author.


Received: 11 May 2013 / Revised: 18 Sep. 2013 / Accepted: 24 Dec. 2013 / Published: 8 May 2014

Index Terms

Cryptology, Encryption Technique, Chaos Function, Logistic Map, Cipher text, Digital Logic Circuit


Chaotic system based message encryption system for wired and wireless networks broadly used in computer engineering, communication and network security, such as robotic systems, encryption, synchronization and genetic network. The main motive for developing the chaos based cryptosystem is to attain encryption with several compensation over the conventional encryption algorithms such as high security, speed, complexity, cost and quality assurance. These challenges encourage the researchers to develop novel chaos based data encryption techniques with digital logics dealing with encryption of messages for fast and secure communication networks. This effort provides a modified version of traditional data encryption algorithms to provide good quality and performance in a secure communication network environment. A cryptology technique is widely used in network security during communication. An avalanche effect is the attractive property of cryptography in which two different keys produce different cipher text for the same data information and also some Important properties related to chaotic systems are sensitivity to initial condition and nonlinearity, which makes two similar or slightly different keys to generate completely different cipher text to produce confusion. It has been proposed a novel fast & secure encryption Technique which uses the chaotic map function to generate the different multiple keys and shows that negligible difference in parameters of chaotic function generate completely different keys as well as cipher text. Cryptanalysis of the proposed algorithm shows the strength and security of algorithm and keys.

Cite This Paper

Ankur A. Khare, Piyush B. Shukla, Sanjay C. Silakari, "Secure and Fast Chaos based Encryption System using Digital Logic Circuit", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.6, pp.25-33, 2014. DOI:10.5815/ijcnis.2014.06.04


[1]Yong Peng Xiao and Yi Han, “An Encrypt Approach Using Dynamic Encrypt keys”, IEEE, pp. 3273-3277, 2007.
[2]Sundarapandian Vaidyanathan, “Complete Synchronization Of Hyperchaotic Xu And Hyperchaotic Lu Systems Via Active Control”, International Journal of Computer Science & Engineering Survey (IJCSES), Vol.3, No.3, pp. 1-15, 2012.
[3]Brad Aimone and Stephen Larson “Chaotic Circuits and Encryption”, Neurophysics Lab, pp. 1-12, 2006.
[4]A. Masmoudi, W. Puech and M.S. Bouhlel, “A new joint lossless compression and encryption scheme combining a binary arithmetic coding with a pseudo random bit generator”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 1, pp. 170-175, 2010.
[5]G. Alvarez, F. Montoya, M. Romera and G. Pastor, “Cryptanalysis Of A Chaotic Encryption System”, pp. 191-196, 2000.
[6]A. Palacios and H. Juarez, “Cryptography with cycling chaos”, ELSEVIER, pp. 345-351, 2002.
[7]Ercan Solak, and Cahit Cokal, “Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps”, Elsevier, pp. 6922-6924, 2008.
[8]J M Blackledge,”Cryptography using Deterministic Chaos: Application to Symmetric Encryption”, Lecture Notes, Warsaw University of Technology, pp. 1-86, 2011.
[9]Roland Schmitz, “Use of chaotic dynamical systems in cryptography”, ELSEVIER, pp. 429-441, 2001.
[10]Bassem Bakhache and Kassem Ahmad and Safwan el Assad,“A New Chaotic Encryption Algorithm to Enhance the Security of ZigBee and Wi-Fi networks”, International Journal of Intelligent Computing Research (IJICR), Vol. 2, Issues 4, pp. 219-227, 2011.
[11]R. Hasimoto-Beltran, “Low-complexity chaotic encryption system”, Revista Mexicana De Fisica , Vol. 53, No. 1, pp. 58-65, 2007.
[12]ShujunLi , Gonzalo Alvarez, Zhong Li and Wolfgang A. Halang, “Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey”, pp.1-6, 2007.
[13]Amit Pande, Joseph Zambreno, “A chaotic encryption scheme for real-time embedded systems: design and implementation”, Springer, pp. 1-11, 2011.
[14]Tao Yang., “A Survey of Chaotic Secure Communication Systems”, International Journal of Computational Cognition, Vol. 2, No. 2, pp. 81–130, 2004.
[15]Fei Peng, Xiao-wen Zhu, and Min Lon, “An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos”, IEEE Transactions on Information Forensics and Security, VOL. 8, NO. 10, pp. 1688-1699, 2013.
[16]Kristina Kelberand Wolfgang Schwarz, “General Design Rules for Chaos-Based Encryption Systems”, NOLTA, pp. 465-468, 2005.
[17]P. Jhansi Rani and S. durgaBhavani, “Symmetric Encryption using Logistic map”, RAIT, pp. 1-5, 2012.
[18]K. Prasadh, K. Ramar and R. Gnanajeyaraman, “Public key cryptosystems based on chaotic Chebyshev polynomials”, Journal of Engineering and Technology Research, Vol.1, pp. 122-128, 2009.
[19]Mohamed I. Sobhy and Alaaedin R. Shehata, “Chaotic Algorithm for Data Encryption”, IEEE, pp. 997-1000, 2001.
[20]Dalia H. Elkamshoushy, A. KhairyAboulsoud, “Cryptographic Schemes Using Chaotic System”, National Radio Science Conference NRSC, pp. 1-6, 2008.
[21]GoceJakimoski and LjupcoKocarev, “Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps”, IEEE, Vol. 48, No. 2, pp. 163-169, 2001.
[22]Guoping Tang, Xiaofeng Liao, Di Xiao and Chuandong Li, “A Secure Communication Scheme Based on Symbolic Dynamics”, IEEE, pp. 13-17, 2004.
[23]LjupcoKocarev,“Chaos-Based Cryptography : A Brief Overview”, IEEE, pp. 1-16, 2011.
[24]C. Wang and S.S. Ge, “Adaptive synchronization of uncertain chaotic systems via backstepping design”, Elsevier, pp. 1199-1206, 2001.
[25]Long JyeSheu, Wei Ching Chen, Yen Chu Chen and Wei Tai Weng, “A Two-Channel Secure Communication Using Fractional Chaotic Systems”, World Academy of
Science, Engineering and Technology, pp. 1057-1061, 2010.
[26]BhavanaAgrawal and HimaniAgrawal, “Survey Report On Chaos Based Cryptography”, IJREAS, Vol. 2, Issue 2, pp. 921-939, 2012.
[27]I.A. Kamil and O.A. Fakolujo, “Lorenz-Based Chaotic Secure Communication Schemes”, Ubiquitous Computing and Communication Journal, Vol. 7, No. 2, pp. 1248-1254, 2008.
[28]JinhongLuo and HaiyiShi , “Research of Chaos Encryption Algorithm Based on Logistic Mapping”, IEEE, pp. 1-3, 2006.
[29]A.B. Orue, V. Fernandez, G. Alvareza, G. Pastor, M. Romera, Shujun Lib, F. Montoya, “Determination of the Parameters for a Lorenz System and Application to Break the Security of Two-channel Chaotic Cryptosystems”, Physics Letter, pp-5588-5592, 2008.
[30]Daniel-Ioan Curiac, Daniel Iercan, Octavian Dranga, Florin Dragan, Ovidiu Banias, “Chaos-Based Cryptography: End of the Road”, IEEE, pp. 71-76, 2007.
[31]Bin Zhang, Chenhui Jin, “Cryptanalysis of a Chaos-based Stream Cipher”, IEEE, pp. 2782-2785, 2008.
[32]Zheng-Guang Wu and Peng Shi, “Sampled-Data Synchronization of Chaotic Lur’e Systems With Time Delays”, Vol. 24, No. 3, pp. 410-421, 2013.
[33]Ching-Kun Chen and Chun-Liang Lin, “Text Encryption Using ECG signals with Chaotic Logistic Map”, IEEE, pp. 1741-1746, 2010.
[34]Ahmed M. Elshamy, Ahmed N. Z. Rashed, Abd El-Naser A. Mohamed, Osama S. Faragalla, Yi Mu, Saleh A. Alshebeili, and F. E. Abed El-Samie, “Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding”, Journal Of Lightwave Technology, IEEE, VOL. 31, NO. 15, pp. 2533-2539, 2013.
[35]William Ditto and Toshinori Munakata, “Principles and Applications of Chaotic System”, ACM, vol. 38, no. 11, pp. 96-102, 1995.
[36]Ercan Solak,” Cryptanalysis of Observer Based Discrete-Time Chaotic Encryption Schemes”, International Journal of Bifurcation and Chaos, Vol. 15, No. 2, pp. 653-658, 2005.
[37]Bassem Bakhache, and Kassem Ahmad, Safwan EI Assad, “Chaos based improvement of the security of ZigBee and WI-Fi networks used for industrial controls”, IEEE, pp. 139-145, 2011.
[38]Filali Rania Linda, Sonia Hammami, Mohamed Benrejeb, and Pierre Borne, “Synchronization of discrete-time hyperchaotic maps based on an aggregation technique for encryption”, IEEE, pp. 1-6, 2012.
[39]Ahmed M. Elshamy, Ahmed N. Z. Rashed, Abd El-Naser A. Mohamed, Osama S. Faragalla, Yi Mu, Saleh A. Alshebeili, and F. E. Abd El-Samie, “Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding”, Journal Of Lightwave Technology, IEEE, VOL. 31, NO. 15, pp. 2533-2539, 2013.
[40]J.M. Amigo, L. Kocarev and J. Szczepanski, “Theory and practice of chaotic cryptography”, ELSEVIER, pp. 211-216, 2007.
[41]Ibrahim S. I. Abuhaiba1, Amina Y. AlSallut, Hana H. Hejazi, and Heba A. AbuGhali, “Cryptography Using Multiple Two-Dimensional Chaotic Maps”,IJCNIS, MECS, PP. 1-7, 2012.